Applied Mechanics and Materials
Vol. 554
Vol. 554
Applied Mechanics and Materials
Vol. 553
Vol. 553
Applied Mechanics and Materials
Vol. 552
Vol. 552
Applied Mechanics and Materials
Vol. 551
Vol. 551
Applied Mechanics and Materials
Vol. 550
Vol. 550
Applied Mechanics and Materials
Vols. 548-549
Vols. 548-549
Applied Mechanics and Materials
Vols. 543-547
Vols. 543-547
Applied Mechanics and Materials
Vols. 541-542
Vols. 541-542
Applied Mechanics and Materials
Vol. 540
Vol. 540
Applied Mechanics and Materials
Vol. 539
Vol. 539
Applied Mechanics and Materials
Vol. 538
Vol. 538
Applied Mechanics and Materials
Vols. 536-537
Vols. 536-537
Applied Mechanics and Materials
Vol. 535
Vol. 535
Applied Mechanics and Materials Vols. 543-547
Paper Title Page
Abstract: As one of the main characteristics of ICN (Information Centric Networking), in-network caching had played a huge role in reducing network traffic. How to make reasonable use of the limited cache space in order to improve the cache hit ratio and reduce the network traffic had become the focus of the cache management in ICN. Considering users had different preferences in different data types, and the impact of data popularity on the data access rates, a new cache management scheme was proposed for ICN. In the proposed scheme, data were classified into different categories based on their semantic information, and the interest vector of nodes was defined according to the corresponding user preferences in different categories of data in order to address replica placement. Meantime, data popularity was introduced to solve the problem of cache replacement. Simulation results show that the proposed scheme was both feasible and effective in saving the cache space, improving the cache hit ratio and reducing network traffic load.
3406
Abstract: Key core technologies of IOT (internet of things) have to be addressed to achieve rapid development. This paper focused on studying RFID, wireless sensor network (WSN) and TCCP which were integrated to address the IOT application problems. Meanwhile, an IOT architectural model was established and the IOT applications in real-time medical monitoring, intelligent transportation system (ITS), intelligent appliances and intelligent agriculture were introduced.
3411
Abstract: digital, network library information resources, makes the object of library information service has been extended from the school teachers and students to the whole society; and further improve readers' information requirements, requirements of the construction of the information resources of digital library must actively using modern computer, network technology, using modern information technology to promote the construction of the information resources of digital library development higher level, in order to meet the increasing needs of readers, to better serve the readers.
3415
Abstract: Database grid service provides users with a unified interface to access to distributed heterogeneous databases resources. To overcome the weakness of collaborative services ability in different grid portal, a new grid portal architecture based on CSGPA (Collaborative Services Grid Portal Architecture), is proposed. It devotes integrating database into Grid environment with grid service. In comparison with the current mainstream grid portal architecture, the results show that CSGPA has great advantage in efficiency, deployment costs, scalability and reusability etc.
3419
Abstract: This paper first introduces the basic concepts of related technologies and cloud storage, and then analyzes the architecture and components of cloud storage platform which is compatible with Amazon S3. And particularly shows the implementation of CAS (Content Addressable Storage) which also needs to communicate with S3 server. S3fs (Amazon S3-based file system, which called S3fs) is developed through the frame of FUSE based on Amazon S3. The communication between CAS and S3 is transparent for users. S3fs also take the management of chunked file indexed by hash value, which could reduce the consumption of bandwidth caused by synchronization.
3423
Abstract: Retracted paper: RPCs must work. Here, we demonstrate the refinement of forward-error correction. We disconfirm that though Smalltalk can be made interactive, virtual, and optimal, cache coherence and redundancy can collaborate to solve this issue.
3427
Abstract: With the development of the mobile Internet, cloud computing, physical networking and triple play, data flow grows rapidly. It brings huge test to operators network, so the demand for 10G PON scale commercial deployment is standing out. Although there are the frontier techniques of WDM-POM40G PON, however, they are being researched now. It needs a long time for application. For the PON technology, EPON and GPON are the current main technical standards.
3431
Abstract: This paper considers a relay-assisted hybrid cooperative beamforming system in independent and identically Rayleigh fading channels. In this system, each relay can adaptively employ amplify-and-forward (AF) or decode-and-forward (DF) protocol for maximizing the instantaneous signal-to-noise ratio (SNR). Tight upper and lower bounds for the outage probability have been derived in closed form, based on which we investigate the achievable diversity of the hybrid cooperative beamforming system. We also present the corresponding upper and lower bounds of the average channel capacity. Numerical results are provided to validate our theoretic analyses.
3435
Abstract: The rapid development of 3 g mobile internet technology and the extensive use of intelligent mobile phone system make a user access the Internet not only can through a computer which has networking conditions, but also can through the mobile phone whenever and wherever. This paper designed and developed the method of accessing to the Web server based on the Android platform, it provides a quick and convenient way for the developers.
3441
Abstract: Pretty Good Privacy is a kind of software used for Email encrypting. This paper expounds its algorithm and running principle. PGP's trust model and the functions of each component in PGP Message are analyzed. Meanwhile, the paper deeply illuminates the whole procedure of sending and receiving PGP message. In the end, PGP's applications are presented, and its security is briefly discussed.
3445